A Comprehensive Study on Learning-Based PE Malware Family Classification Methods Authors: Yixuan Ma, Shuang Liu, Jiajun Jiang, Guanhong Chen, Keqiu Li | Published: 2021-10-29 PE Malware ClassificationPoisoningEvaluation Method 2021.10.29 2025.05.28 Literature Database
Towards A Conceptually Simple Defensive Approach for Few-shot classifiers Against Adversarial Support Samples Authors: Yi Xiang Marcus Tan, Penny Chong, Jiamei Sun, Ngai-man Cheung, Yuval Elovici, Alexander Binder | Published: 2021-10-24 PoisoningAdversarial Example Detectionevaluation metrics 2021.10.24 2025.05.28 Literature Database
PRECAD: Privacy-Preserving and Robust Federated Learning via Crypto-Aided Differential Privacy Authors: Xiaolan Gu, Ming Li, Li Xiong | Published: 2021-10-22 Privacy ProtectionPoisoningRobustness Evaluation 2021.10.22 2025.05.28 Literature Database
Back in Black: A Comparative Evaluation of Recent State-Of-The-Art Black-Box Attacks Authors: Kaleel Mahmood, Rigel Mahmood, Ethan Rathbun, Marten van Dijk | Published: 2021-09-29 Backdoor AttackPoisoningAdversarial attack 2021.09.29 2025.05.28 Literature Database
Adversarial Transfer Attacks With Unknown Data and Class Overlap Authors: Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff | Published: 2021-09-23 | Updated: 2021-09-24 PoisoningRobustnessAdversarial attack 2021.09.23 2025.05.28 Literature Database
SoK: Machine Learning Governance Authors: Varun Chandrasekaran, Hengrui Jia, Anvith Thudi, Adelin Travers, Mohammad Yaghini, Nicolas Papernot | Published: 2021-09-20 Privacy Risk ManagementPoisoningFederated Learning 2021.09.20 2025.05.28 Literature Database
Dubhe: Towards Data Unbiasedness with Homomorphic Encryption in Federated Learning Client Selection Authors: Shulai Zhang, Zirui Li, Quan Chen, Wenli Zheng, Jingwen Leng, Minyi Guo | Published: 2021-09-08 Client Selection MethodPoisoningFederated Learning 2021.09.08 2025.05.28 Literature Database
Machine Unlearning of Features and Labels Authors: Alexander Warnecke, Lukas Pirch, Christian Wressnegger, Konrad Rieck | Published: 2021-08-26 | Updated: 2023-08-07 Backdoor AttackPoisoningMachine Learning Method 2021.08.26 2025.05.28 Literature Database
Privacy-Preserving Machine Learning: Methods, Challenges and Directions Authors: Runhua Xu, Nathalie Baracaldo, James Joshi | Published: 2021-08-10 | Updated: 2021-09-22 Privacy Protection PipelinePrivacy AssessmentPoisoning 2021.08.10 2025.05.28 Literature Database
Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption Authors: Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite | Published: 2021-08-07 | Updated: 2021-11-09 AlgorithmPoisoningFederated Learning 2021.08.07 2025.05.28 Literature Database